Theorizing Information Security Success: Towards Secure E-Government

被引:5
作者
Dukerley, Kimberley [1 ]
Tejay, Gurvirender [1 ]
机构
[1] Nova Southeastern Univ, Grad Sch Comp & Informat Sci, Ft Lauderdale, FL 33314 USA
关键词
E-Government; Information Systems Security Success; Information Technology; Organizations; Security Benefit;
D O I
10.4018/jegr.2010070103
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
As information systems become more pervasive within organizations, securing their associated information assets has become a topic of extensive research. However, minimal research has been focused on understanding the dimensions of information systems security within an organizational context. This study organizes a considerable body of information systems security literature based on their findings, and the authors identify core dimensions of information system security success and operationalize them as a model to predict success with information security initiatives. The utility of the proposed model is evaluated for the e-Government context and emergent issues for research and practice are discussed.
引用
收藏
页码:31 / 41
页数:11
相关论文
共 53 条
[1]  
Anderson J, 1972, COMPUTER SECURITY TE
[2]   Why we need a new definition of information security [J].
Anderson, JM .
COMPUTERS & SECURITY, 2003, 22 (04) :308-313
[3]   Why information security is hard - An economic perspective [J].
Anderson, R .
17TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2001, :358-365
[4]  
ANDERSON RH, 1999, SECURING US DEFENSE
[5]   Does information security attack frequency increase with vulnerability disclosure? An empirical analysis [J].
Arora, Ashish ;
Nandkumar, Anand ;
Telang, Rahul .
INFORMATION SYSTEMS FRONTIERS, 2006, 8 (05) :350-362
[6]  
Axelsson S., 2000, ACM Transactions on Information and Systems Security, V3, P186, DOI 10.1145/357830.357849
[7]  
Backhouse J, 2006, MIS QUART, V30, P413
[8]  
Baskerville R., 2002, Logistics Information Management, V15, P337, DOI 10.1108/09576050210447019
[9]   INFORMATION-SYSTEMS SECURITY DESIGN METHODS - IMPLICATIONS FOR INFORMATION-SYSTEMS DEVELOPMENT [J].
BASKERVILLE, R .
COMPUTING SURVEYS, 1993, 25 (04) :375-414
[10]  
Boritz J. E., 2004, MANAGING ENTERPRISE